Cyber Defense Mechanisms (eBook, PDF)
Security, Privacy, and Challenges
Redaktion: Kumar, Gautam; Cuong, Nguyen Ha Huy; Saini, Dinesh Kumar
48,95 €
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
48,95 €
Als Download kaufen
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
Cyber Defense Mechanisms (eBook, PDF)
Security, Privacy, and Challenges
Redaktion: Kumar, Gautam; Cuong, Nguyen Ha Huy; Saini, Dinesh Kumar
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 9.84MB
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 230
- Erscheinungstermin: 8. September 2020
- Englisch
- ISBN-13: 9781000171921
- Artikelnr.: 59851473
- Verlag: Taylor & Francis
- Seitenzahl: 230
- Erscheinungstermin: 8. September 2020
- Englisch
- ISBN-13: 9781000171921
- Artikelnr.: 59851473
Gautam Kumar, PhD, is working with Dept. of Computer Science and Engineering, CMR Engineering College, Hyderabad. He received his PhD degree in Computer Science and Engineering from Jaypee University of Information Technology, Himachal Pradesh, India. He did his M.Tech from Rajasthan Technical University and B.E. from Rajiv Gandhi Proudyogiki Vishwavidyalaya, Madhya Pradesh. He is having a professional teaching experience of more than of 14+ years in the various institutions Institute of Engineering and Technology, Rajasthan, ICFAI University, Hyderabad, and Narsimha Reddy Engineering College, Hyderabad, India. He has taught more than of 20 Computer Science & Engineering subjects. His research interests are in the field of Cryptography, Information Security, Algorithms Designs and Analysis. He has published more than 35 research journals and conferences papers of repute in Science Citation Indexed and Scopus Indexed Journals. Till date he is having two patents. He is a Reviewer of (i) Security and Communication Networks, John Wiley & Sons[Indexed in Science Citation Indexed, SCOPUS], (ii) The Computer Journal, Oxford Academic [Indexed in Science Citation Indexed, SCOPUS], & many Reputes of IEEE/ACM International Conferences. In his credit, he is has handled various responsibility such as Institute's Innovation Council, President from Institute, and Smart-India Hackthon, Convenor (MHRD). Dinesh Kumar Saini is an Associate Professor working with Faculty of Computing, Information Technology, Sohar University, Sultanate of Oman. He is having experience of more than 18+ years in academic. He has handled various administrative posts. He has published more than 120 research journals and conferences papers of repute. He is also part of the editorial and advisory board of several journals and has been editor of several special issues in books and journals. He has supervised various academic R&D projects. His area of expertise in Computer Science and Engineering, Information Technology, Software Systems, Business Administration and Human Resource Management. Nguyen Ha Huy Cuong, PhD, working The University of Danang- College of Information Technology. Ha Huy Cuong Nguyen obtained his doctorate in Computer Science / Resource Allocation Cloud Computing in 2017 from the University of Da Nang. He has published over 30 research papers. His main research interests include the resource allocation, detection, prevention, and avoidance of cloud computing and distributed systems. He serves as a technical committee program member, track chair, session chair and reviewer of many international conferences and journals. He is a guest editor journal "International Journal of Information Technology Project Management (IJITPM)" with Special Issue On: Recent Works on Management and Technological Advancement. He is editor/reviewer for Machine Learning & Networked Collaborative Engineering Journal, Asian Journal For Convergence In Technology (AJCT) Journal, and some international conferences.
Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies
Chapter 2 Defense against the Survivability to Network Strategies
Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security
Systems
Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor
Networks
Chapter 5 Security Issues in IoT Networks
Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario
Chapter 7 Design Principles and Privacy in Cloud Computing
Chapter 8 Big Data Analysis on Smart Tools and Techniques
Chapter 9 Lightweight Security Protocols for Blockchain Technology
Chapter 10 Privacy and Challenges to Data-Intensive Techniques
Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer
Network Using Pre-Quarantine
Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as
Human-like Robotic Player for Fighting Game Using Rule-Based Method
Chapter 13 Web-Based Smart Agriculture System
Index.
Chapter 2 Defense against the Survivability to Network Strategies
Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security
Systems
Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor
Networks
Chapter 5 Security Issues in IoT Networks
Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario
Chapter 7 Design Principles and Privacy in Cloud Computing
Chapter 8 Big Data Analysis on Smart Tools and Techniques
Chapter 9 Lightweight Security Protocols for Blockchain Technology
Chapter 10 Privacy and Challenges to Data-Intensive Techniques
Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer
Network Using Pre-Quarantine
Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as
Human-like Robotic Player for Fighting Game Using Rule-Based Method
Chapter 13 Web-Based Smart Agriculture System
Index.
Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies
Chapter 2 Defense against the Survivability to Network Strategies
Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security
Systems
Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor
Networks
Chapter 5 Security Issues in IoT Networks
Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario
Chapter 7 Design Principles and Privacy in Cloud Computing
Chapter 8 Big Data Analysis on Smart Tools and Techniques
Chapter 9 Lightweight Security Protocols for Blockchain Technology
Chapter 10 Privacy and Challenges to Data-Intensive Techniques
Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer
Network Using Pre-Quarantine
Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as
Human-like Robotic Player for Fighting Game Using Rule-Based Method
Chapter 13 Web-Based Smart Agriculture System
Index.
Chapter 2 Defense against the Survivability to Network Strategies
Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security
Systems
Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor
Networks
Chapter 5 Security Issues in IoT Networks
Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario
Chapter 7 Design Principles and Privacy in Cloud Computing
Chapter 8 Big Data Analysis on Smart Tools and Techniques
Chapter 9 Lightweight Security Protocols for Blockchain Technology
Chapter 10 Privacy and Challenges to Data-Intensive Techniques
Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer
Network Using Pre-Quarantine
Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as
Human-like Robotic Player for Fighting Game Using Rule-Based Method
Chapter 13 Web-Based Smart Agriculture System
Index.